{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T02:30:10Z","timestamp":1761964210279},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642005923"},{"type":"electronic","value":"9783642005930"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00593-0_32","type":"book-chapter","created":{"date-parts":[[2009,3,27]],"date-time":"2009-03-27T10:26:08Z","timestamp":1238149568000},"page":"456-469","source":"Crossref","is-referenced-by-count":14,"title":["Enhanced Property Specification and Verification in BLAST"],"prefix":"10.1007","author":[{"given":"Ond\u0159ej","family":"\u0160er\u00fd","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"32_CR1","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1002\/smr.321","volume":"17","author":"J. Adamek","year":"2005","unstructured":"Adamek, J., Plasil, F.: Component composition errors and update atomicity: static analysis. Journal of Software Maintenance and Evolution\u00a017(5), 363\u2013377 (2005)","journal-title":"Journal of Software Maintenance and Evolution"},{"issue":"4","key":"32_CR2","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/1218063.1217943","volume":"40","author":"T. Ball","year":"2006","unstructured":"Ball, T., Bounimova, E., Cook, B., Levin, V., Lichtenberg, J., McGarvey, C., Ondrusek, B., Rajamani, S.K., Ustuner, A.: Thorough static analysis of device drivers. SIGOPS Oper. Syst. Rev.\u00a040(4), 73\u201385 (2006)","journal-title":"SIGOPS Oper. Syst. Rev."},{"issue":"5","key":"32_CR3","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1145\/381694.378846","volume":"36","author":"T. Ball","year":"2001","unstructured":"Ball, T., Majumdar, R., Millstein, T., Rajamani, S.K.: Automatic predicate abstraction of c programs. SIGPLAN Not.\u00a036(5), 203\u2013213 (2001)","journal-title":"SIGPLAN Not."},{"key":"32_CR4","unstructured":"Ball, T., Rajamani, S.K.: Slic: A specification language for interface checking. Technical Report MSR-TR-2001-21, Microsoft Research (January 2002)"},{"key":"32_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-27864-1_2","volume-title":"Static Analysis","author":"D. Beyer","year":"2004","unstructured":"Beyer, D., Chlipala, A., Henzinger, T., Jhala, R., Majumdar, R.: The Blast query language for software verification. In: Giacobazzi, R. (ed.) SAS 2004. LNCS, vol.\u00a03148, pp. 2\u201318. Springer, Heidelberg (2004)"},{"key":"32_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-31984-9_2","volume-title":"Fundamental Approaches to Software Engineering","author":"D. Beyer","year":"2005","unstructured":"Beyer, D., Henzinger, T.A., Jhala, R., Majumdar, R.: Checking memory safety with blast. In: Cerioli, M. (ed.) FASE 2005. LNCS, vol.\u00a03442, pp. 2\u201318. Springer, Heidelberg (2005)"},{"key":"32_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1007\/978-3-540-73368-3_51","volume-title":"Computer Aided Verification","author":"D. Beyer","year":"2007","unstructured":"Beyer, D., Henzinger, T.A., Th\u00e9oduloz, G.: Configurable software verification: Concretizing the convergence of model checking and program analysis. In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, vol.\u00a04590, pp. 504\u2013518. Springer, Heidelberg (2007)"},{"key":"32_CR8","volume-title":"Proceedings of the 23rd IEEE\/ACM International Conference on Automated Software Engineering (ASE\u00a02008)","author":"D. Beyer","year":"2008","unstructured":"Beyer, D., Henzinger, T.A., Th\u00e9oduloz, G.: Program analysis with dynamic precision adjustment. In: Proceedings of the 23rd IEEE\/ACM International Conference on Automated Software Engineering (ASE\u00a02008). IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"32_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-540-77395-5_3","volume-title":"Runtime Verification","author":"E. Bodden","year":"2007","unstructured":"Bodden, E., Hendren, L.J., Lam, P., Lhot\u00e1k, O., Naeem, N.A.: Collaborative runtime verification with tracematches. In: Sokolsky, O., Ta\u015f\u0131ran, S. (eds.) RV 2007. LNCS, vol.\u00a04839, pp. 22\u201337. Springer, Heidelberg (2007)"},{"key":"32_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1007\/978-3-540-31980-1_40","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"E. Clarke","year":"2005","unstructured":"Clarke, E., Kroening, D., Sharygina, N., Yorav, K.: SATABS: SAT-Based Predicate Abstraction for ANSI-C. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol.\u00a03440, pp. 570\u2013574. Springer, Heidelberg (2005)"},{"key":"32_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/10722167_15","volume-title":"Computer Aided Verification","author":"E.M. Clarke","year":"2000","unstructured":"Clarke, E.M., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Counterexample-guided abstraction refinement. In: Emerson, E.A., Sistla, A.P. (eds.) CAV 2000. LNCS, vol.\u00a01855, pp. 154\u2013169. Springer, Heidelberg (2000)"},{"key":"32_CR12","first-page":"238","volume-title":"POPL 1977: Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages","author":"P. Cousot","year":"1977","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: POPL 1977: Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages, pp. 238\u2013252. ACM, New York (1977)"},{"key":"32_CR13","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1145\/1181775.1181790","volume-title":"SIGSOFT 2006\/FSE-14: Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering","author":"B.S. Gulavani","year":"2006","unstructured":"Gulavani, B.S., Henzinger, T.A., Kannan, Y., Nori, A.V., Rajamani, S.K.: Synergy: a new algorithm for property checking. In: SIGSOFT 2006\/FSE-14: Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering, pp. 117\u2013127. ACM, New York (2006)"},{"issue":"1","key":"32_CR14","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/565816.503279","volume":"37","author":"T.A. Henzinger","year":"2002","unstructured":"Henzinger, T.A., Jhala, R., Majumdar, R., Sutre, G.: Lazy abstraction. SIGPLAN Not.\u00a037(1), 58\u201370 (2002)","journal-title":"SIGPLAN Not."},{"key":"32_CR15","volume-title":"The Spin Model Checker, Primer and Reference Manual","author":"G. Holzmann","year":"2003","unstructured":"Holzmann, G.: The Spin Model Checker, Primer and Reference Manual. Addison-Wesley, Reading (2003)"},{"key":"32_CR16","volume-title":"Introduction to Automata Theory, Languages, and Computation","author":"J.E. Hopcroft","year":"2000","unstructured":"Hopcroft, J.E., Motwani, R., Ullman, J.D.: Introduction to Automata Theory, Languages, and Computation, 2nd edn. Addison-Wesley, Reading (2000)","edition":"2"},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"Pasareanu, C.S., Pel\u00e1nek, R., Visser, W.: Predicate abstraction with under-approximation refinement. Logical Methods in Computer Science\u00a03(1) (2007)","DOI":"10.2168\/LMCS-3(1:5)2007"},{"issue":"11","key":"32_CR18","doi-asserted-by":"publisher","first-page":"1056","DOI":"10.1109\/TSE.2002.1049404","volume":"28","author":"F. Plasil","year":"2002","unstructured":"Plasil, F., Visnovsky, S.: Behavior protocols for software components. IEEE Transactions on Software Engineering\u00a028(11), 1056\u20131076 (2002)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"32_CR19","unstructured":"Poch, T.: Distributed behavior protocol checker. Master\u2019s thesis, Charles University in Prague, Czech Republic (2006)"},{"issue":"2","key":"32_CR20","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1023\/A:1022920129859","volume":"10","author":"W. Visser","year":"2003","unstructured":"Visser, W., Havelund, K., Brat, G., Park, S., Lerda, F.: Model Checking Programs. Automated Software Engineering\u00a010(2), 203\u2013232 (2003)","journal-title":"Automated Software Engineering"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00593-0_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T07:36:16Z","timestamp":1551944176000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00593-0_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642005923","9783642005930"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00593-0_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}